Correspondent Sy Truong has just had an Iphone App called BI Flash approved. It allows you to deliver SAS reports and data to the IPhone, enter parameters, capture...Franz Dill From The Eponymous Pickle | October 6, 2009 at 06:39 PM
When you get an invitation via email should you accept? How well targeted is it? Some real examples that I got.
I would like to invite you toclick...GASARCH From Computational Complexity | October 6, 2009 at 05:15 PM
A $1.99 IPhone App called IP Camera can take a picture every 12 to 15 seconds and then posts the picture to a local network via WiFi. Effectively a security camera...Franz Dill From The Eponymous Pickle | October 6, 2009 at 02:56 PM
This is brilliant:
The sophisticated hack uses a Trojan horse program installed on the victim's machine that alters html coding before it's displayed in the user's...schneier From Schneier on Security | October 6, 2009 at 11:40 AM
Digital Revolution (working title) is an open source documentary, due for transmission on BBC Two in 2010, that will take stock of 20 years of change brought about...Experientia From Putting People First | October 6, 2009 at 06:55 AM
As has been anticipated for a while–and discussed during the Ethics of Blogging panel–the United States Federal Trade Commission (FTC) has published explicit guidelines...Daniel Tunkelang From The Noisy Channel | October 6, 2009 at 03:19 AM
I decided to read Outliers by Malcolm Gladwell as it was recommended to me by several people. That in turn let me to read his first book Tipping Point. This may... From Computer Science Teachers Association | October 5, 2009 at 10:32 PM
Wow. It's over 2,000 pages, so it'll take time to make any sense of. According to Ross Anderson, who's given it a quick look over, "it seems to be the bureaucratic...schneier From Schneier on Security | October 5, 2009 at 08:10 PM
It's a security risk:
The crate was hoisted onto the flatbed with a 120-ton construction crane. For security reasons, there were no signs on the truck indicating...schneier From Schneier on Security | October 5, 2009 at 06:29 PM
Microsoft is exploring the concept of multi-touch mice, a new research paper reveals.
The paper is being presented today as part of the User Interface Software...Experientia From Putting People First | October 5, 2009 at 06:13 PM
Kevin Anderson reports in The Guardian on how a new generation of monitors can generate data about your energy use and help you cut your costs and carbon.
“These...Experientia From Putting People First | October 5, 2009 at 06:06 PM
Roger Dooley suggests that the recent mention of using brain scans to provide accurate and specific predictions for scary movie content really shows a further failure...Franz Dill From The Eponymous Pickle | October 5, 2009 at 05:51 PM
In a prior post (a while back) I pondered if Mahaney's theorem (SAT \le_m S, S Spare, implies P=NP) should be taught in a basic grad course in complexity. I thought...GASARCH From Computational Complexity | October 5, 2009 at 05:16 PM
Steve King writes an excellent blog: Small Business Labs on small business and entrepreneurial topics that is useful. Notable is a recent article on the increasing...Franz Dill From The Eponymous Pickle | October 5, 2009 at 02:15 PM
Computer Science can be taken a natural science: the study of how the universe processes information. If it is a natural science, then does it build on Physics?...Daniel Lemire From Daniel Lemire's Blog | October 5, 2009 at 02:00 PM
The Information Security and Privacy Advisory Board will meet. The focus of the meeting will be on the NIST Information Technology Laboratory... From U.S. Public Policy Committee of the ACM | October 5, 2009 at 12:58 PM